Multiattribute Evaluation Model Based on the KSP Algorithm for Edge Computing

Ruizhong Du, Kunqi Xu, Xiaoyan Liang
2020 IEEE Access  
To solve the problems of single evaluation attributes and highly overlapping trust paths in the current trust model, a multiattribute trust evaluation model based on the K shortest paths (KSP) algorithm is proposed. The model refines the evaluation attributes among nodes and uses the analytic hierarchy process (AHP) to allocate the weights based on users' preferences to meet the special needs of individual users. Also, the model introduces the penalty factor algorithm idea of KSP and proposes a
more » ... trust path optimization algorithm RKSP based on the A * algorithm. It can filter highly overlapping trust paths during the formation of recommended trust paths so that the searched trust paths have certain differences. Through comparative experiments, it is proven that the model can reduce the resource overhead of edge devices, improve the accuracy of evaluation, ensure load balancing within the domain, and better align the results of the model recommendation with user needs. INDEX TERMS Trust model, multiattribute, trust path, KSP algorithm. I. INTRODUCTION The rise of the Internet of Everything and 5G technology leads to new computing models such as fog computing [1], edge computing [2] and mobile edge computing [3] . Edge computing can provide near ground real-time computing and storage functions through smartphones, cameras, wearable devices, smart gateways, etc. It can reduce the pressure of the cloud computing center and network bandwidth, with the advantages of low latency and high energy efficiency [4], [5] . Moreover, it has a good application effect in intelligent car networking, virtual reality, healthcare, smart homes, smart cities, industrial Internet of Things and other scenarios [6]- [8] . However, the characteristics of edge devices, such as openness, dynamics, autonomy, and the lack of stable basic protection measures, result in the lack of necessary trust between devices. As a result, it is difficult for devices to resist unreliable fraud and services, the collaboration between devices is prone to problems, and considerable private data can become exposed [9], [10] . Establishing trust relationships between devices to detect untrusted entities can effectively eliminate malicious and selfish nodes, reduce the risk of independent decision-making,
doi:10.1109/access.2020.3015041 fatcat:nsuwyijwgfglbcdjvludnih5yy